Question

The protection of information systems against unauthorized access to or modification of information that is stored, processed, or being sent over a network is referred to as

A) information assurance.

B) data integrity.

C) information integrity.

D) human firewall.

Answer

This answer is hidden. It contains 1 characters.